Filters








482,802 Hits in 3.6 sec

Efficient and Secure Mobile Cloud Networking [article]

Jacques Bou Abdo
2021 arXiv   pre-print
Mobile cloud computing is a very strong candidate for the title "Next Generation Network" which empowers mobile users with extended mobility, service continuity and superior performance.  ...  This architecture, named OCMCA (Operator Centric Mobile Cloud Architecture), connects the user from one side and the Cloud Service Provider (CSP) from the other and hosts a cloud within its network.  ...  security) and compare its security against the mobile cloud architecture found in literature.  ... 
arXiv:2102.09051v2 fatcat:jfdwtdw75nef3fmxwaogbazxvq

Security for Mobile and Adhoc Network

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
A MANET is a distributed infrastructure-less network and in major cases it is concerned about the individual level of security solutions, since the MANET is a kind of decentralized type of network and  ...  In this paper we give the overview of the security in MANET and in case if there is any attack how the Network can be protected with theuse of the different security and protection technique.  ...  Figure 1: Mobile Ad hoc Network As the MANETs are self-organizing network and each node acts as router, server and client as well.  ... 
doi:10.35940/ijitee.e2905.059720 fatcat:bglfbq5kofavfo7lf7skcymoj4

Securing Mobile Adhoc Networks And Cloud Environment

Divya Gautam
2018 Zenodo  
Securing mobile adhoc networks and cloud environment in opposition to denial of service attack by examine and predict the network traffic.  ...  Ad-Hoc Networks to detect anomalous physical or virtual nodes.  ...  Conclusion In this paper of dissimilar technique for detecting and prevent DDOS Securing mobile adhoc networks system and the relative analysis amongst them has been converse is in advance attractiveness  ... 
doi:10.5281/zenodo.1197526 fatcat:3no4dkm6ibgb3dpiyepzoytina

Security and Privacy in Wireless and Mobile Networks

Georgios Kambourakis, Felix Gomez Marmol, Guojun Wang
2018 Future Internet  
Particularly, apart from network and link layer security, the focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps.  ...  Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous.  ...  The security risks due to design shortcomings and vulnerabilities related to end-user behavior when interacting with mobile devices is the focus of the work by Vasileios Gkioulos, Gaute Wangen and Sokratis  ... 
doi:10.3390/fi10020018 fatcat:yestvrnf7rat5diyoofemnlb3y

Wireless and Mobile Networks: Security and Privacy Issues

Arun Kumar Sangaiah, Marimuthu Karuppiah, Xiong Li
2017 Journal of Electrical and Computer Engineering  
In the paper entitled " e High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking" X.  ...  With the advent of G networks in the era of Internet of ings (IoT), wireless and mobile networking have become prevalent everywhere.  ...  and suggestions on time.  ... 
doi:10.1155/2017/5174073 fatcat:o3wxdc5wx5c3tkio2347ypurbi

Security for QoS assured wireless and mobile networks

M. Cesana, A. Boukerche, A. Zomaya
2010 Security and Communication Networks  
Such challenges are even made harder in mobile wireless scenarios where the network infrastructure may feature mobile, energy and resource-constrained network devices.  ...  The aim of this special issue is to provide an upto-date snapshot on advanced solutions to support the design and deployment of secure and efficient services in wireless mobile networks.  ...  Issue for mobile ad hoc networking and computing), and ACM/Kluwer Wireless Networks and ACM/Kluwer Mobile Networks Applications, and the Journal of Wireless Communication and Mobile Computing.  ... 
doi:10.1002/sec.201 fatcat:nlt4di4iv5e43izj4nnty4f7bq

Security in Sensor Networks [chapter]

Farooq Anjum, Saswati Sarkar
2006 Mobile, Wireless, and Sensor Networks  
Ron Rivest in 1995 • Main feature: data-dependent rotations • Parameterized for word size, number of rounds, length of key • Low memory requirements RC5 Plaintext Key Ciphertext Key Scheduling • Nodes and  ...  base station share a master key pre-deployment • Other keys are bootstrapped from the master key: -Encryption key RC5 1 Key master Key encryption 9 Key Scheduling • Nodes and base station share a master  ...  -Memory: master keys & counters, broadcast key chain -Battery: all nodes communicate with it, or use it to setup keys Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks  ... 
doi:10.1002/0471755591.ch11 fatcat:bvjls4dianf3pexshqabnxdz7a

Securing the mobile enterprise with network-based security and cloud computing

Gustavo de los Reyes, Sanjay Macwan, Deepak Chawla, Cristina Serban
2012 2012 35th IEEE Sarnoff Symposium  
This paper proposes a new security architecture for the mobile enterprise which uses network-based security and cloud computing to both simplify and enhance the security of enterprises, and reinstate the  ...  Keywords-cloud computing; cloud-based security; enterprise security architecture; mobile enterprise; network-based security; security. I.  ...  Therefore all LAN security can be moved into the network and Cloud.  ... 
doi:10.1109/sarnof.2012.6222759 dblp:conf/sarnoff/ReyesMCS12 fatcat:qimznacfvrcercbp2ctnv7fctu

Secure and reliable routing in mobile adhoc networks [article]

Rachid Haboub, Mohammed Ouzzif
2012 arXiv   pre-print
The growing diffusion of wireless-enabled portable devices and the recent advances in Mobile Ad-hoc NETworks (MANETs) open new scenarios where users can benefit from anywhere and at any time for impromptu  ...  MANETs presents also security challenges. These networks are prone to malicious users attack, because any device within the frequency range can get access to the MANET.  ...  In this paper we use a security and a security and mobility aware approach, to improve the AODV (Ad-hoc On-demand Distance Vector) [10] routing protocol, in order to be protected from the resource exhaustion  ... 
arXiv:1203.2044v1 fatcat:sapvrw4xtvbave4u43czdfw54i

Security Issues and Attacks in Mobile Adhoc Networks

Rajshree Soni, Dr. Anil Kumar, Sourabh Singh Verma
2016 International Journal of Engineering Research and  
Then various security issues are discussed and the attacks in mobile adhoc networks have been analyzed. Then the conclusion and future work is discussed.  ...  Since the topology of Mobile Ad Hoc Network (MANET) changes dynamically caused by the node mobility, providing secure routing is the main area of concern.  ...  A great number of security solutions that works well for wired networks don't fit for mobile adhoc networks.  ... 
doi:10.17577/ijertv5is120189 fatcat:y4hpsyevivaznjdg7mumkdizzm

Security Aspects and Challenges in Mobile Adhoc Networks

G. Jose Moses, P.Suresh Varma, N. Supriya, G. NagaSatish
2012 International Journal of Computer Network and Information Security  
The traditional notion of a Adhoc wireless network is one in which there are a few Base Stations or Access Points and a number of Mobile Stations or Nodes.  ...  The Adhoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium and network topology.  ...  Figure 1 : 1 Working of an Adhoc Network 3 ) 3 Integrity: Message being transmitted is never corrupted. Security Aspects and Challenges in Mobile Adhoc Networks Copyright © 2012 MECS I.J.  ... 
doi:10.5815/ijcnis.2012.06.04 fatcat:belyeqnmard3hlxbmbdtf474au

Protocol SS7 and the Security of Mobile Networks

Kristina Guzhakovskaya, Yuriy Umnitsyn
2019 NBI Technologies  
Until mobile operators are able to abandon this technology, this threat in the field of information security will remain relevant.  ...  The paper considers Global System for Mobile Communications, which plays the important role in contemporary society and carries new forms of dialog in the modern world.  ...  -Режим доступа: https://blog. kaspersky.ru/hacking-cellular-networks/9862/ (дата обращения: 28.02.2017). 6. Фишер, Д. Что такое «человек посереди- не»? / Д. Фишер. -Электрон. дан.  ... 
doi:10.15688/nbit.jvolsu.2018.4.1 fatcat:65o6xftjdrf2zeespzj2jtsz3e

Security and Dynamic Encryption System in Mobile Ad-Hoc Network [chapter]

Peter H., Udo W.
2011 Mobile Ad-Hoc Networks: Protocol Design  
Compared with wired networks, wireless communication provides better connectivity and mobility, which allows mobile devices to access other local area networks or the Internet at anytime and anywhere.  ...  , such as battlefields, disaster relief operations, mobile device/ personal networking, mobile information sharing and vehicular networks (Kant et al., 2005) ; (Liu et al., 2007) .  ...  for wireless networks, included both Base Station (BS)-oriented and mobile adhoc networks, to the security level closer to wired one.  ... 
doi:10.5772/12843 fatcat:yzmbahi2kvhwbkwxjmjhe5pera

Evolution of Mobility in Future Wireless Networks

Ajay Rajkumar
2012 Journal of Cyber Security and Mobility  
However, notwithstanding the above, an additional area that has important implications is to evolve seamless and non-seamless session mobility across disparate access technologies such as WiFi to offload  ...  Similarly, selective handover of specific flows across smaller cells such as Femto and Pico cells of the same access technology will have an impact on the overall capacity of the network.  ...  Acknowledgements I will like to thank my colleagues at Alcatel-Lucent for discussions around this topic and other general aspects of evolution in wireless networks.  ... 
doi:10.13052/jcsm2245-1439.117 fatcat:quvbrusem5cpfel5ogi23wyqzq

A secure and resistant architecture against attacks for mobile ad hoc networks

Abderrezak Rachedi, Abderrahim Benslimane
2010 Security and Communication Networks  
The nodes' mobility results in a dynamically changing network topology.  ...  The effects of direct connectivity and transmission range on the stability and security of the network are analysed.  ...  In addition, the network's security is not scalable and the CA cannot be reachable by all nodes due to the nodes' mobility.  ... 
doi:10.1002/sec.116 fatcat:em5ygs2avfgv7ad2f6d5wepeue
« Previous Showing results 1 — 15 out of 482,802 results